| -1 | -1A | Poor Quality Identity |
| -1E | Porting Attack |
| -1F | Unusual Line Type |
| -1G | Online Temp Phone |
| -1H | High Activity Online Temp Phone |
| -1M | High Telco Event Activity |
| 0 | 0B | No Data |
| 0D | Active at one point, but not used anymore |
| 0E | Low Tenure |
| 0F | Unusually High Activity / Positive Bot Identification |
| 1 | 1A | The phone is behaviorally active. Prove found evidence of its presence on the network. |
| 1B | Prove linked the phone to a specific identity. |
| 1A+1B | Data sources have current data and there are no recent disconnects and Prove has seen this identity before. |
| 1C | IsHuman ML Bot Model identified person as human. |
| 1D | Network Active Member |
| 2 | 2A | Prove has seen this phone and identity before at moderate-to-high confidence. |
| 2B | Prove corroborated data across more than one identity data source. |
| 3 | 3A | Prove has seen this phone and identity before at very high confidence, this is this person’s primary number. |